JobsEQ by Chmura Logo

Identity & Access Management Administrator

Maryland Courts

Location: Annapolis Area, MD
Type: Full-Time, Permanent, Non-Remote
Posted on: April 11, 2025
This job is no longer available from the source.
Job Description
Sign In | New User
Previous Job
Next Job
Return to Previous Page
Job Details
Job Title
Identity & Access Management Administrator
Job ID
12379
Location
Annapolis Area
Full/Part Time
Full-Time
Favorite Job
Regular/Temporary
Regular
-
Job Title
Identity and Access Management Administrator
Division/Department
JIS Information Security
Closing Date
April 25, 2025
Location
Judicial Information Systems
Administrative Office of the Courts
Annapolis, Maryland
Salary
$75,238
FLSA Status
Exempt
Financial Disclosure
As a state employee, you may be required to file an annual Financial Disclosure with the State Ethics Commission. If you are required to file, you will be notified by the Judiciary Human Resources Division and must file within 30 days of employment and no later than April 30th of each subsequent calendar year.
At Will
No
Position Type
Regular Full Time
The Maryland Judiciary offers a generous benefit package including medical, dental, vision, life insurance, paid time off, paid holidays, tuition assistance, continuing education programs, employee assistance programs, and State Retirement and Pension plans.
Maryland Judiciary Benefits (mdcourts.gov)
About the Maryland Court System | Maryland Courts (mdcourts.gov)
Online Published Salary Ranges 2025
Essential Job Functions:
The Information Security Identity and Access Management (IAM) Administrator is responsible for end user and functional/system account creations, modifications, and deletions for the network, database, and applications across the enterprise. The role supports internal and external user accounts, including multi-factor authentication for external users, and contributes to policy creation, change management, and compliance monitoring. The IAM Administrator participates in on-call rotation, supports off-hours incidents, and assists in security investigations and disaster recovery exercises.
Identify and Access Management
Responsible for end user and functional/system account creations, modifications, and deletions across network, database, applications, and external business accounts required for business operations.
Responsible for managing user groups across various systems and assisting in group modifications during recertifications.
Responsible for expediting and responding quickly to user account transfer or termination events from Human resources or external liaisons.
Responsible for granting or denying access to resources based on user roles and/or privileges.
Responsible for documenting and executing a repeatable process for accessibility and mapping user/systems/application access requirements to organizational and functional roles.
Responsible for the creation, maintenance and routine updates to process and procedures.
Responsible to identify and address issues and work with teams to resolve problems.
Responsible for the processing and creation of Customer Service requests that include Requests, Incidents and Tasks
Responsible for approving and processing Technology Request and Security Access Request Forms and coordination efforts to fulfill the request.
Participating in audits and review of access control reports to identify potential risks.
Responsible for monitoring distribution mailbox(s) and provide systems access request forms to Judiciary external partners.
Participate in regular user account access reviews for internal / external systems as required.
Responsible for regular user account clean-up activities.
Responsible for the support of profile data management (i.e. MFA, Unique Identification numbers for 60,000 + external users
Assist in the development of new Information Security standards, guidelines, process, procedures, policy and compliance monitoring as required.
User account assistance, PIN support, change management, incident response and disaster recovery exercise participation / planning.
Platform Administration:
Coordinate the deployment, configuration, and maintenance of various identity management platforms.
Responsible for the management of secure privileged account sessions, accounts, credentials, and secrets.
Develop and enforce access policies and workflows to control and monitor privileged access across the enterprise.
Establish onboarding and offboarding process and procedures for vendor remote access management.
Administer security settings, user roles, system connectivity, permissions, and vendor access.
Ensure multi-factor authentication and single sign-on is enabled for administrative user access. Ensure muti-factor authentication is enabled for vendor remote access.
Perform regular audits and reviews to ensure compliance and user access to include internal privileged access users and external vendor access.
Perform regular privileged account discoveries and review across all network end-points (desktops, servers, other domain joined devices).
In coordination with the SOC investigate and respond to security incidents, recorded session reviews, and other user account related activities.
Develop process and procedures to streamline privileged access management operational efficiencies.
Ensure that all systems are patched and updated on a regular basis or as needed based upon the release of vendor provided upgrades.
Other duties as assigned.
After hours on-call support
Formal training, attend conferences, webinars, informal research, review of trade journals, periodicals, etc. to stay current on Information Security technology, regulations, and best practices.
Minimum Qualifications:
Education: Bachelor?s degree from an accredited college or university, preferably in Computer Science, Information Technology, Information Security, or Cybersecurity.
Experience: Three (3) years of information technology experience to include desktop support, privileged access management, identity access management, compliance monitoring, disaster recovery, or information security.
Note: Professional work experience as defined above may be substituted on a year for year basis for up to four (4) years of the required education.
Licenses and Certifications preferred:
Certified Identity and Access Manager . Certified Privileged Access Manager
Knowledge of:
Knowledge and understanding of role and rights provisioning and ability to follow established policies (e.g., separation of duties) that include all components that go into the identity lifecycle management.
Knowledge of the underlying technical infrastructure and how it works in support of the organization.
Skill in administration of platforms related to identity, account, and access management.
Ability to analyze requests, build groups and apply custom polices for system access.
Skill in fully and competently managing a high number of user accounts in an enterprise environment.
Skill in the proficient use of systems utilized to manage user accounts, to include, but not limited to Windows Active Directory, Azure Active Directory and Red Hat Enterprise Linux (RHEL)
Securing and monitoring privileged accounts and associated system access.
Implementing and managing secure authentication access like multi-factor authentication
Skill in role-based access control and least privileges.
Skill in a strong attention to detail and processing requests with great accuracy in a timely fashion.
Skill in proficiently organizing resources and establishing priorities.
Skill in effective verbal and written communication.
Ability to analyze enterprise impact and overall goals of the Judiciary when carrying out job responsibilities.
Ability to identify, engage, and collaborate with the appropriate resources to effectively address customer service needs.
Ability to acquire greater knowledge through continuous learning and a willingness to share the information to the betterment of the security posture of the Judiciary.
Skill in:
Administer platforms related to identity, account, access, policy and other specific areas related to identity lifecycle management.
Analyzing and configuration of least privilege access controls based on need and function.
Developing workflow processes for onboarding/offboarding of vendor/contractors.
Develop process and procedure for user lifecycles related administrative tasks.
Explaining security concepts to non-technical stakeholders.
Attention to detail.
Identifying and mitigating identity-related security risks.
Working with security, compliance, and IT teams.
Monitor ticket queues and meet service level agreements.
Ability to:
Influence, negotiate, or diffuse difficult situations.
Provide fast, friendly, and accurate customer service.
Troubleshoot authentication and access issues efficiently.
React quickly to emergency situations as they arise.
Participate in on-call after hours (nights / weekends) rotational support.
Be detail oriented and apply critical thinking on all work-related activities.
Pass a comprehensive background check for Criminal Justice Information Services (CJIS) compliance.
Physical Requirements:
Sedentary work. Exerting up to 10 pounds of force occasionally and/or negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met.
Equipment, Machinery and Tools:
Laptop for daily and on-call work
Software and Computer Skills:
Microsoft Office, Active Directory, Adobe, Red Hat, and Identity and Access Management platforms used in daily work to manage user accounts and access.
Selection Process:
Your application package will be used to determine your eligibility, qualifications, and ranking for this position. If you are determined to be ineligible or not qualified, your application will receive no further consideration. It is essential that you provide complete and accurate information on your application. Please report all related education, experience, dates, and hours of work. If you have held more than one (1) position at the same employer, you must list each position that you held, the length of time that you held each position, and the corresponding duties. Description of duties that state, "see resume" will negatively impact consideration for this position. Applicants will not be contacted for additional information. Only applicants considered for this position will be contacted.
Complete applications must be submitted by the closing date. Information submitted after this date will not be added. Incomplete applications will not be accepted. Resumes will not be accepted in lieu of a completed application.
For further information please contact Talent Acquisition at aocta@mdcourts.gov .
The Maryland Judiciary is an equal-opportunity employer committed to fostering a workplace culture of diversity, equity, inclusion, and belonging. We do not discriminate on the basis of race, color, religion, age, sex, pregnancy, marital status, national origin, military or veteran status , physical or mental disability, familial status, genetic information, gender identity or expression, sexual orientation, or any other characteristic protected by State or federal law. Applicants who need an ADA Accommodation during the application and/or interview process should send their request via email to ADA@mdcourts.gov or call 410-260-1732. The Maryland Judiciary is a drug-free workplace. Applicants must be United States citizens or eligible to work in the United States.
Please find the Maryland Judiciary's equal employment opportunity policy here: Policy Prohibiting Discrimination, Harassment, and Retaliation .
Return to Previous Page